+ All Categories
Home > Documents > SA Documentation

SA Documentation

Date post: 13-Apr-2018
Category:
Upload: karthickdevan
View: 217 times
Download: 0 times
Share this document with a friend

of 21

Transcript
  • 7/26/2019 SA Documentation

    1/21

    Project Description

    Our project entitled Seating arrangement system for collegeis to develop and setup

    an application, which helps universities and college to reduce their human and manage the

    examination seating arrangement for the students and also students can know their allotted room

    at the time of examination. No of students allocated in a room, staff allocated for the exam

    details and much more related information is maintained in an efficient manner in the database

    and a user friendly graphical interface is created, so that the information about any room

    allotment and staff allotment at the time of examination in colleges with their respective room

    can be found in quick time and in less effort.

    The overall project is designed and developed in regard to the need of the universities and

    colleges where they can do seating arrangement for examination in computeried manner.

    This project is meant for maintaining the examination details, student details who are all

    attending the exams, !bsentees details, "taff allotment for respective room are available in the

    database. "o we can retrieve the information from database to system at the time of examination.

  • 7/26/2019 SA Documentation

    2/21

    Visual Basic 6:

    #$"%!& '!"$( is a high level programming language which evolved from the earlier

    )O" version called '!"$(. '!"$( means 'eginners* !ll+purpose "ymbolic $nstruction (ode. $t

    is a very easy programming language to learn. The code looks a lot like nglish &anguage.

    )ifferent software companies produced different versions of '!"$(, such as -icrosoft

    '!"$(, %$(/'!"$(, 01'!"$(, $'- '!"$(! and so on. 2owever, people prefer to use

    -icrosoft #isual 'asic today, as it is a well+developed programming language and supporting

    resources are available everywhere.

    Now, there are many versions of #' exist in the market, the most popular one and still

    widely used by many #' programmers is none other than #isual 'asic 3. 1e also have #'.net,

    #'4556, #'4557 and the latest #'4585. 'oth #b4557 and #'4585 are fully object orientedprogramming 9OO:; language.

    #$"%!& '!"$( is a #$"%!& and events driven :rogramming &anguage. These are the

    main divergence from the old '!"$(. $n '!"$(, programming is done in a text+only

    environment and the program is executed sequentially. $n #', programming is done in a

    graphical environment. $n the old '!"$(, you have to write program code for each graphical

    object you wish to display it on screen, including its position and its color. 2owever, $n #' , you

    just need to drag and drop any graphical object anywhere on the form, and you can change its

    color any time using the properties windows.

    On the other hand, because the user may click on certain object randomly, so each object

    has to be programmed independently to be able to response to those actions 9events;. Therefore,

    a #' :rogram is made up of many subprograms, each has its own program code, and each can

    be executed independently and at the same time each can be linked together in one way or

    another.

  • 7/26/2019 SA Documentation

    3/21

    The Control Properties

    'efore writing an event procedure for the control to response to a user*s input, you have

    to set certain properties for the control to determine its appearance and how it will work with the

    event procedure.

  • 7/26/2019 SA Documentation

    4/21

    picture from the selected folder.

  • 7/26/2019 SA Documentation

    5/21

    $f?.Then?.lesif in later lesson. #b@ed and vb'lue are color constants and 'ack(olor is the

    background color property of the form.

    The (ption Bo!

    The Option 'ox control also lets the user selects one of the choices. 2owever, two or

    more Option 'oxes must work together because as one of the Option 'oxes is selected, the other

    Option 'oxes will be unselected. $n fact, only one Option 'ox can be selected at one time. 1hen

    an option box is selected, its value is set to ATrueB and when it is unselectedC its value is set to

    A=alseB. $n the following example, the shape control is placed in the form together with six

    Option 'oxes. 1hen the user clicks on different option boxes, different shapes will appear. The

    values of the shape control are 5, 8, and 4,D,E,6 which will make it appear as a rectangle, a

    square, an oval shape, a rounded rectangle and a rounded square respectively.

    The Dri)e "ist Bo!

    The )rive &ist'ox is for displaying a list of drives available in your computer. 1hen you

    place this control into the form and run the program, you will be able to select different drives

    from your computer as shown in =igure D.D

    The Directory "ist Bo!

    The )irectory &ist 'ox is for displaying the list of directories or folders in a selected

    drive. 1hen you place this control into the form and run the program, you will be able to select

    different directories from a selected drive in your computer.

    The *ile "ist Bo!

    The =ile &ist 'ox is for displaying the list of files in a selected directory or folder. 1hen

    you place this control into the form and run the program, you will be able to shown the list of

    files in a selected directory as shown in =igure D.6

  • 7/26/2019 SA Documentation

    6/21

  • 7/26/2019 SA Documentation

    7/21

    =or those users who donFt want to write programs, access provides macros. -acros let us

    perform common tasks without user intervention. -acros let us manipulate data, open forms

    and reports and automate any task that is repetitive or complex.

    Conte!t1Sensiti)e Help an &ns0er /i2ar

    &ike 1indows NT, !ccess provides online, context+sensitive help. !ccess also includes a

    unique !nswer 1iards that answer questions written in simple nglish.

    Built1in Security

    "ince !ccess is a multi+user database, security features are built into the )'-". 1e can

    enable database security at various levels. 1e can assign a password for loading !ccess so

    that only authoried users can use it

    Data#ase (#jects

    !ccess stores all the data tables and other objects in a single database. These database objects

    are queries, =orms, @eports and -acros.

    3ueries

    ! query is used to extract information from a database. ! query can select a group of records

    that fulfill a certain condition. -ost !ccess databases contain more than one table. 1e can

    combine specific fields from multiple tables into one datasheet

    *orms

    =orms display and print data from a table or a query. =orms enable us view, edit and print

    data in a custom format.

    .

    reports

  • 7/26/2019 SA Documentation

    8/21

    @eports present our data in a printed format. 1e can create different types of reports with a

    )'-". Our reports can combine multiple tables to present complex relationships among

    different sets of data.

  • 7/26/2019 SA Documentation

    9/21

    S4ST-+ ST.D4

    5$ -7%ST%89 S4ST-+

    The existing system is carried out manually. The existing system includes the data entries in

    unclear package and most complicated packages. $t contains of policies that simply makes the

    job more complicated and confusable storages in the system.

    Demerits

    The processing time is very high.

    There is a chance for committing many mistakes.

    @etrieval of information is very difficult.

    rror detection and correction may take long time.

    1astages of physical efforts.

    5$5 P,(P(S-D S4ST-+

    The new proposed system, which has been designed with -icrosoft #isual 'asic 3.5 as the

    =ront+end, -icrosoft !ccess 455D as the 'ack+end and )ata report, is very effective in

    eliminating the problems encountered with the existing manual system.

    +erits

    $t reduces tedious calculations.

    -aintenance of the record is very easy.

    asy to implement at real time scenarios.

    The total processing time is less.

    %ser+friendly environment is provided.

  • 7/26/2019 SA Documentation

    10/21

    5$ *-&S%B%"%T4 ST.D4

    ! feasibility study is a preliminary study undertaken before the real work of a project starts to

    ascertain the likelihood of the project*s success. $t is an analysis of possible solutions to a

    problem and a recommendation on the best solution to use. $t involves evaluating how the

    solution will fit into the corporation. $t, for example, can decide whether an order processing be

    carried out by a new system more efficiently than the previous one.

    ! feasibility study is defined as an evaluation or analysis of the potential impact of a proposed

    project or program. ! feasibility study is conducted to assist decision+makers in determining

    whether or not to implement a particular project or program. The feasibility study is based on

    extensive research on both the current practices and the proposed projectGprogram and its impact

    on the selected organiation operation. The feasibility study will contain extensive data related tofinancial and operational impact and will include advantages and disadvantages of both the

    current situation and the proposed plan.

    The feasibility study is conducted to assist the decision+makers in making the decision that will

    be in the best interest of the school food service operation. The extensive research, conducted in

    a non+biased manner, will provide data upon which to base a decision.

    ! feasibility study could be used to test a new working system, which could be used becauseH

    The current system may no longer suit its purpose,

    Technological advancement may have rendered the current system redundant,

    The business is expanding, allowing it to cope with extra work load,

    (ustomers are complaining about the speed and quality of work the business provides,

    (ompetitors are not winning a big enough market share due to an effective integration of

    a computeried system.

    !lthough few businesses would not benefit from a computeried system at all, the process of

    carrying out this feasibility study makes the purchaserGclient think carefully about how it is going

    to be used.

    !fter request clarification, analyst proposes some solutions. !fter that for each solution it is

    checked whether it is practical to implement that solution.

  • 7/26/2019 SA Documentation

    11/21

    This is done through feasibility study. $n this various aspects like whether it is technically or

    economically feasible or not. "o depending upon the aspect on which feasibility is being done it

    can be categoried into four classesH

    Technical Feasibility

    Economic Feasibility

    Operational Feasibility

    Legal Feasibility

    The outcome of the feasibility study should be very clear. $t should answer the following issues.

    $s there an alternate way to do the job in a better wayI

    1hat is recommendedI

    Technical *easi#ility

    $n technical feasibility the following issues are taken into consideration.

    1hether the required technology is available or not

    1hether the required resources are available

    o -anpower+ programmers, testers J debuggers

    o "oftware and hardware

    Once the technical feasibility is established, it is important to consider the monetaryfactors also.

    "ince it might happen that developing a particular system may be technically possible but it may

    require huge investments and benefits may be less. =or evaluating this, economic feasibility of

    the proposed system is carried out.

    http://domains.googlesyndication.com/apps/domainpark/results.cgi?client=ca-afdo-pub-3366691112917527&url=http://freetutes.us/&hl=en&ac=r&q=monetary&afdt=pnCHggu8yLUKEwiv7IP30--YAhUCWnoKHYNK1TwQAxgBIAIwx6f2DjgeUMen9g5Qy7qLD1DVrK8PUNq3tRFQquj_E1DfoK8pUP3IidUBhttp://domains.googlesyndication.com/apps/domainpark/results.cgi?client=ca-afdo-pub-3366691112917527&url=http://freetutes.us/&hl=en&ac=r&q=monetary&afdt=pnCHggu8yLUKEwiv7IP30--YAhUCWnoKHYNK1TwQAxgBIAIwx6f2DjgeUMen9g5Qy7qLD1DVrK8PUNq3tRFQquj_E1DfoK8pUP3IidUB
  • 7/26/2019 SA Documentation

    12/21

    -conomic *easi#ility

    =or any system if the expected benefits equal or exceed the expected costs, the system can be

    judged to be economically feasible. $n economic feasibility, cost benefit analysis is done inwhich expected costs and benefits are evaluated. conomic analysis is used for evaluating the

    effectiveness of the proposed system.

    $n economic feasibility, the most important is cost+benefit analysis. !s the name suggests, it is an

    analysis of the costs to be incurred in the system and benefits derivable out of the system. (lick

    on the link below which will get you to the page that explains what cost benefit analysis is and

    how you can perform a cost benefit analysis.

    (perational *easi#ility

    Operational feasibility is mainly concerned with issues like whether the system will be used if it

    is developed and implemented. 1hether there will be resistance from users that will affect the

    possible application benefitsI The essential questions that help in testing the operational

    feasibility of a system are following.

    )oes management support the projectI

    !re the users not happy with current business practicesI 1ill it reduce the time

    9operation; considerablyI $f yes, then they will welcome the change and the new system.

    2ave the users been involved in the planning and development of the projectI arly

    involvement reduces the probability of resistance towards the new system.

    1ill the proposed system really benefit the organiationI )oes the overall responseincreaseI 1ill accessibility of information be lostI 1ill the system affect the customers

    in considerable wayI

    "egal *easi#ility

  • 7/26/2019 SA Documentation

    13/21

    $t includes study concerning contracts, liability, violations, and legal other traps frequently

    unknown to the technical staff.

  • 7/26/2019 SA Documentation

    14/21

    $ S4ST-+ D-S%98

    $ %8P.T D-S%98

    Input Design is the process of converting user-originated data to a computer based

    format. Errors are controlled in the input design screen.

    The goal of designing the Input Design is to make data entry as easy as possible.

    Timely messages are given for every transaction and samples are shown in table

    views. So objectives of Input Design are

    To produce cost effective method of $nput

    To achieve good accuracy

    To ensure input is acceptable and understood by the user.

    $5 C(D- D-S%98

    ! code is an ordered collection of symbols designed to provide unique identification of data. The

    main purpose of performing the code design is to simplify the coding and to achieve better

    performance. The coding is prepared in such a way that the internal procedures are utilied

    properly, validation messages are also displayed.

    The variable has been chosen for processing of data is meaningful to the context in which it is

    used. The coding of variables is done in such a way that anyone other than person who

    developed then package can understand its purpose. Thus the maintainability we made easier.

    The purpose of code is to facilitate the identification and retrieval of items of information

    (oding is done with objects that very quickly processing of data, simple to understand and easy

    to debug the errors. =urther development and modification in coding will do easily.

    $5$ CH&,&CT-,%ST%CS (* 9((D C(D%89:

    %niqueness

    -eaningfulness

    "tability

  • 7/26/2019 SA Documentation

    15/21

    $ D&T&B&S- D-S%98

    The first step in the development of a project is to design a robust database. 'efore you design a

    database, itFs a good idea to recapitulate the concepts related to a database. ! database is a

    repository of data, a place where you can store data and extract it whenever required.

  • 7/26/2019 SA Documentation

    16/21

    The objective of the system is generation of reports for the queries posed. The output gives the

    direct source of information to the user. The output design should be well formed so that it

    contains all the required information and should be well formed to avoid any complexity in

    getting information.

    1ell+designed output increases the efficiency and it should provide clarity to the user. The

    output from the system communicates the results of process to the user. ! brief description

    should be given at end of each page. The output from the computer system communicates the

    results of processing to the user

  • 7/26/2019 SA Documentation

    17/21

    =$ S4ST-+ T-ST%89 &8D %+P"-+-8T&T%(8

    =$ S4ST-+ T-ST%89

    "ystem testing is actually a series of different tests whose primary purpose is to fully exercise the

    computer+based system. !lthough each test has a different purpose, all work to verify that all

    system elements have been properly integrated and perform allocated functions. $n the following

    section, different system tests are discussed.

    =$$ /hite Bo! Testing

    1hite box testing focuses on the internal functioning of the product. =or this different

    procedures are tested. 1hite box testing tests the following

    &oops of the procedure

    )ecision points

    =$$5 Blac' Bo! Testing

    'lack box testing tests the overall functional requirements of product. $nputs are supplied to

    product and outputs are verified. $f the outputs obtained are same as the expected ones then the

    product meets the functional requirements. $n this approach internal procedures are not

    considered. $t is conducted at later stages of testing. Now we will look at black box testing

    technique.

    'lack box testing uncovers following types of errors.

    $ncorrect or missing functions

    $nterface errors

    xternal database access

    :erformance errors

  • 7/26/2019 SA Documentation

    18/21

    $nitialiation and termination errors.

    =$$ .nit Testing

    1e know that smallest unit of software design is a module. %nit testing is performed to check the

    functionality of these units. it is done before these modules are integrated together to build the

    overall system. "ince the modules are small in sie, individual programmers can do unit testing

    on their respective modules. "o unit testing is basically white box oriented. :rocedural design

    descriptions are used and control paths are tested to uncover errors within individual modules.

    %nit testing can be done for more than one module at a time.

    The following are the tests that are performed during the unit testingH

    Module interface test:here it is checked if the information is properly flowing into the

    program unit and properly coming out of it.

    Local data structures:these are tested to see if the local data within unit9module; is

    stored properly by them.

    Boundary conditions: $t is observed that much software often fails at boundary

    conditions. That*s why boundary conditions are tested to ensure that the program is

    properly working at its boundary conditions.

    ndependent paths: !ll independent paths are tested to see that they are properly

    executing their task and terminating at the end of the program.

    Error handling paths:These are tested to check if errors are handled properly by them.

    =$$= %ntegration Testing

    %nit testing ensures that all modules have been tested and each of them works properly

    individually. %nit testing does not guarantee if these modules will work fine if these are

    integrated together as a whole system. $t is observed that many errors crop up when the modules

    are joined together. $ntegration testing uncovers an error that arises when modules are integrated

    to build the overall system.

  • 7/26/2019 SA Documentation

    19/21

    $ntegration testing is a systematic technique for constructing the program structure while

    conducting tests to uncover errors associated with interfacing. The objective is to take unit tested

    modules, integrate them, find errors, remove them and build the overall program structure as

    specified by design.

    =$$> ,eco)ery Testing

    -any computer+based systems must recover from faults and resume operation within a pre+

    specified time. $n some cases, a system may be fault tolerantC that is, processing faults must not

    cause overall system function to cease. $n other cases, a system failure must be corrected within a

    specified period or severe economic damage will occur.

    @ecovery testing is a system test that forces the software to fail in a variety of ways and verifies

    that recovery is properly performed. $t the recovery is automated 9performed by system itself;,

    re+initialiation mechanisms, data recovery, and restart are each evaluated for correctness. $f the

    recovery requires human intervention, the mean time to repair is evaluated to determine whether

    it is within acceptable limits.

    =$$6 Stress Testing

    "tress tests are designed to confront program functions with abnormal situations. "tress testing

    executes a system in a manner that demands resources in abnormal quantity, frequency, or

    volume.

    =$$? Security Testing

    !ny computer+based system that manages sensitive information or causes actions that can harm

    or benefit individuals is a target for improper or illegal penetration.

    "ecurity testing attempts to verify that protection mechanism built into a system will protect it

    from unauthoried penetration. )uring security testing, the tester plays the role of the individual

    who desires to penetrate the system. The tester may attack the system with custom software

    designed to break down any defenses that have been constructedC may overwhelm the system,

  • 7/26/2019 SA Documentation

    20/21

    thereby denying service to othersC may purposely cause system errors, hoping to find the key to

    system entryC and so on.

    0iven enough time and resources, good security testing will ultimately penetrate a system. The

    role of the system designer is to make penetration cost greater than the value of the information

    that will be obtained in order to deter potential threats.

    =$5 S4S4-+ %+P"-+-8T&T%(8

    $mplementation is that stage of the project when the theoretical design is turned into working

    system. !t this stage of the main workload, the greatest up heaved and the major impact on the

    existing practices shifts to the under department. ! lot of planning has to go in for the successful

    implementation o the system.

    'eing in mind that implementation is a project in itself C care was taken to develop an effective

    methodology for implementing the system. The major steps that are carried out in these stages

    are summaried belowH

    Training was given to the user of the system both theoretically as well practically.

    They were briefed on the lines on the objectives of the system how to operate if and

    the benefits that would reaped from the system. The system as test in the userFs environment and the user was prompted to give his

    suggestions.

    xisting data was converted into file structures compatible to the system.

    The strategy user changeover of the system was parallel along with the automated

    system to test the validity of the system.

    =$ S4ST-+ +&%8T-8&8C-

    $t is impossible to produce systems of any sie, which do not need to be changed. Over

    the lifetime of a system, its original requirements will be modified to reflect changing

  • 7/26/2019 SA Documentation

    21/21

    user and customer needs. The system*s environment will change as new hardware is

    introduced. rror, undiscovered during system validation, may merge and require repair.

    The process of changing of a system after it has been delivered and is in use is called "oftware

    maintenance. The changes may involve simple changes to correct coding errors, more extensive

    changes to correct design errors or significant enhancement to correct specification errors or

    accommodate new requirements. -aintenance therefore, in this context, really means evolution.

    $t is the process of changing a system to maintain its ability to survive.

    There are three types of software maintenance with very blurred distinction between them.

    =$5$ Correcti)e +aintenance

    (orrective -aintenance is concerned with fixing reported errors in the software. (oding errors

    are usually relatively cheap to correctC design errors are more expensive as they may involves the

    rewriting of several programs components. @equirements errors are the most expensive to repair

    because of the extensive system redesign with may be necessary.

    =$5$5 &apti)e maintenance

    !daptive maintenance means changing the software to new environment such as different

    hardware platform or for use with a different operating systems. The software functionality does

    not radically change.

    =$5$ Perfecti)e maintenance

    :erfective maintenance involves implementing new functional or non+functional system

    requirements. These are generated by software customers as their organiations are business

    changes.


Recommended